Stolen laptops have led to major HIPAA enforcement actions, announced yesterday, for two more covered entities. Concentra Health Services (Concentra) and QCA Health Plan, Inc. of Arkansas have paid the HHS Office for Civil Rights (OCR) $1,975,220 collectively to resolve potential violations of the HIPAA Privacy and Security Rules. These significant settlements underscore the importance of an ongoing and sufficient security management plan that actively seeks to protect and safeguard ePHI. OCR opened a compliance review with Concentra upon receiving breach reports that an unencrypted laptop was stolen from one of their facilities – a physical therapy center in Missouri. 
- Many hospitals, medical practices and other providers participating in the Meaningful Use program are dutifully completing their risk analysis—yet as soon these reports are created they sit on the shelf and become dust collectors – with the remediation recommendations ignored. While the requirement for risk analysis is not new (it has been the law since 2005) many hospitals and medical practices began conducting risk assessments only when the meaningful use program began paying them do comply. Many organizations now have 3 risk analyses (in 2011, 2012 and 2013) that provide damning evidence that risks and remediation recommendations are being ignored. HIPAA requires that these recommendations be implemented!
- Remediation recommendations cost money to implement and this reality cannot be avoided. Because financial constraints are always a factor, a good risk assessment will prioritize recommendations to deliver the best bang for the buck. Usually mobile device encryption represents one of the best security values since loss of medical devices containing ePHI is a high probability event, and device encryption is relatively inexpensive. Insist that your risk analysis prioritize remediation recommendations. It is not mandatory to implement all recommendations, but a good track record of implementing the most important ones is essential.
- The enforcement action against QCA Health Plan, like the recent settlement action against Adult & Pediatric Dermatology, P.C. [read our earlier post here] show that the time to encrypt is before the breach and not after. In both of these cases, the covered entity scrambled to encrypt after the breach – yet OCR did not look kindly on this after-the-fact attempt at compliance.
- For the many organizations that have not benefited from the meaningful use incentive program (that is, those who have not been lucky enough to receive payments for HIPAA compliance), like health plans, long-term care providers, physical therapy providers, home health agencies, business associates, etc., make sure that you begin your HIPAA Security compliance program with a good risk analysis.
